Showing results 214 to 222 of 222
< previous
Issue Date | Title | Author(s) |
2019-01-01 | User influence in the propagation of malicious attacks | Jiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W |
2018-01-01 | Using Adversarial Noises to Protect Privacy in Deep Learning Era | Liu, B; Ding, M; Zhu, T; Xiang, Y; Zhou, W |
2017-01-15 | Using epidemic betweenness to measure the influence of users in complex networks | Wen, S; Jiang, J; Liu, B; Xiang, Y; Zhou, W |
2018-07-09 | The Value of Ecosystem Services from Giant Panda Reserves | Wei, F; Costanza, R; Dai, Q; Stoeckl, N; Gu, X; Farber, S; Nie, Y; Kubiszewski, I; Hu, Y; Swaisgood, R; Yang, X; Bruford, M; Chen, Y; Voinov, A; Qi, D; Owen, M; Yan, L; Kenny, DC; Zhang, Z; Hou, R; Jiang, S; Liu, H; Zhan, X; Zhang, L; Yang, B; Zhao, L; Zheng, X; Zhou, W; Wen, Y; Gao, H; Zhang, W |
2005-12-01 | Vision-based SLAM using natural features in indoor environments | Miró, JV; Dissanayake, G; Zhou, W |
- | Visual privacy attacks and defenses in deep learning: a survey | Zhang, G; Liu, B; Zhu, T; Zhou, A; Zhou, W |
2024-08-01 | When Fairness Meets Privacy: Exploring Privacy Threats in Fair Binary Classifiers via Membership Inference Attacks | Tian, H; Zhang, G; Liu, B; Zhu, T; Ding, M; Zhou, W |
2016-01-01 | When Will You Have a New Mobile Phone? An Empirical Answer from Big Data | Ma, Q; Zhang, S; Zhou, W; Yu, S; Wang, C |
2018-07-27 | Who spread to whom? Inferring online social networks with user features | Wang, D; Zhou, W; Zheng, JX; Wen, S; Zhang, J; Xiang, Y |